Employee Cybersecurity Awareness

Overview

IT Services provides cybersecurity awareness content that

  • will help you learn how to protect your identity and university data
  • takes less than 5 minutes per session to complete
  • is delivered to your inbox on Fridays, one session at a time
  • includes periodic scam and phishing simulations throughout the year
  • was developed by industry experts at Arctic Wolf Security

Table of Contents

How can I get started?

All employees will receive specific awareness sessions and simulation emails to their inbox.  

Security Awareness Emails

  • Employees should expect to receive session emails from the following address:
  • Legitimate messages will look like this sample:
Uploaded Image (Thumbnail)

*click on the image to zoom in*

Scam and Phishing Simulations

  • The scam and phishing simulations will look just like actual spam.
    • Treat them as such and avoid clicking on any links they contain.
    • If you do click on one by mistake, don't panic!
    • You'll be redirected to a learning session about the simulation.
Uploaded Image (Thumbnail)

*click on the image to zoom in*

 

Follow-up Reminders

You may receive automated reminders if training sessions remain incomplete.

  • Completion of this training supports our cybersecurity assurance requirements under our partnership with Arctic Wolf, helping to strengthen the organization’s overall security posture.

Back to top


Top (8) Cybersecurity Tips

Stay safe by learning these basic tips

  1. Use Strong Passphrases
  2. Turn On 2FA (Two-Factor Authentication)
  3. Protect Your Devices
  4. Stay Alert
  5. Think About Privacy
  6. Stay Smart Online
  7. Good Habits Matter
  8. Email Hygiene

 

Use Strong Passphrases

  • Make it long (16+ characters). Longer = way harder to crack.
  • Use a phrase you’ll remember (example: CoffeeBefore8AMIsDangerous).
  • Mix uppercase, lowercase, numbers, symbols if required.
  • Spaces and punctuation make it stronger. If a site doesn’t allow spaces, remove them.
  • Never reuse passphrases across accounts.
  • See Choose a strong password and Use a secure app to store all passwords for more information.

Turn On 2FA (Two-Factor Authentication)

  • Also called MFA.
  • Use an authenticator app instead of text if possible.
  • It’s one extra step—but one of the best ways to protect your accounts.
  • See our 2FA + Password Setup Guide for more information.

Protect Your Devices

  • Lock your device with a passphrase.
  • Turn on encryption.
  • Keep your system and apps updated.
  • Use modern antivirus (like Microsoft Defender, Sophos, etc.).
  • Keep your work data + devices separate from your home digital life

Stay Alert

  • If it sounds too good to be true, it probably is.
  • Phishing emails don’t always have spelling mistakes anymore.
  • Ask yourself: Was I expecting this?
  • Don’t click suspicious links—go directly to the website yourself.
  • See Recognize and respond to phishing attempts.

Think About Privacy

  • Don’t overshare —especially on social media.
  • Your personal info is valuable. Protect it.

Stay Smart Online

  • Avoid public Wi-Fi for payments (or use a VPN).
  • Look for the 🔒 lock symbol in your browser.
  • Stick to trusted sites.
  • Type web addresses yourself.
  • Credit cards usually offer better fraud protection than debit cards.

Good Habits Matter

  • Don’t use outdated software.
  • Only download apps from official app stores.
  • Keep your firewall on.
  • Delete apps you don’t use.

Email Hygiene

  • Do not use your ECU Email address as username or other information in non-University services
  • Do use a different passphrase for any non-ECU email account than what you used for your ECU email account
  • Be extremely careful reviewing any message that ECU email puts in quarantine. These messages have high likelihood of being spam and/or phishing
  • Look before you click on any attachments in your email. Are you expecting that word file, pdf, etc? If not, do not open
  • It is best to type the link into your browser manually. There are many ways to hide addresses and/or characters in a link to make it look safe, but really guide you to a nefarious address.
  • Review and release messages caught in the Microsoft email quarantine for more information.

Back to top

Bottom Line

Cybersecurity isn’t just IT Service's responsibility, it's yours too.

Back to top

Was this helpful?
0 reviews
Create Ticket Print Article

Related Services / Offerings (1)

Is something broken or not working? Cybersecurity and technology incidents are handled with a higher priority than basic requests or inquiries.